Table of contents
Preparation 3: Setting the passwords .....................
Preparation 4: Setting the date and time .................
Preparation 5: Configuring the IP address on
the LAN1 side ................................... 45
Preparation 6: Changing the IP addresses of
PCs in the LAN .................................
Preparation 7: Configuring provider information .....
Outline of unauthorized accesses and
security measures ............................................
What is unauthorized access from the Internet? ...
Addressing unauthorized accesses..................
Outline of security functions provided by the product ...75
Security functions against external attacks ...... 75
Security functions for managing terminals
in the LAN .................................................
Other security functions ....................................
Discarding needless packets (inbound filter) ...........
Creating an inbound filter ..................................
Editing the inbound filter list ..............................
Viewing how inbound filters are working ..........
Passing only necessary packets through
a dynamic filter (policy filter) .............................
Viewing or editing a policy set ..........................
Adding a policy ..................................................
Managing multiple policy sets ..........................
Managing interfaces, addresses,
and services in a group ............................ 85
Creating a user definition service .....................
Detecting unauthorized accesses and warning ........
Configuring Intrusion Detection System ...........
Checking the history of unauthorized
access detection .......................................
Allowing communication from registered terminals only
(DHCP authentication) ........................................
Configuring the DHCP server ...........................
Registering all terminals to which IP addresses are
assigned by the DHCP server function ..........
Registering terminals one-by-one ....................
Specifying how unregistered terminals are
handled .....................................................
Please read this first ...................................................
Particular usage in this manual ..................................
Important notice ..........................................................
Concerning software license contracts
when using the DOWNLOAD button ..................
Name and function of individual parts ......................
Front panel/Top panel .......................................
Rear panel .........................................................
Bottom panel .....................................................
Flow of preparation steps..........................................
Ensure the following are available before
beginning preparations .............................
Cautions when installing the product ...............
Preparation 1: Making connections ......................... 15
Preparation 2: Opening the “Basic configuration page”
Preparation 3: Setting the passwords .....................
Preparation 4: Setting the date and time .................
Preparation 5: Configuring the transparent
mode firewall ....................................
Flow of preparation steps..........................................
Ensure the following are available before
beginning preparations .............................
Cautions when installing the product ...............
Preparation 1: Making connections .........................
Preparation 2: Opening the “Basic configuration page”
FWX120 Operation Manual
3
2
FWX120 Operation Manual